Journal articles on the topic 'Protocol Reverse Engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Protocol Reverse Engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Full textYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Full textTao, Huan Qi, Fan Jia, and Yang Wang. "Comparative Analysis of the Status of the Network Protocol Reverse Engineering." Applied Mechanics and Materials 590 (June 2014): 722–26. http://dx.doi.org/10.4028/www.scientific.net/amm.590.722.
Full textDzhum, V. S., and V. A. Losev. "Analysis of network protocol reverse engineering tools." Information Security Questions, no. 1 (2021): 3–10. http://dx.doi.org/10.52190/2073-2600_2021_1_3.
Full textXiao, Ming-Ming, and Yu-Ping Luo. "Automatic protocol reverse engineering using grammatical inference." Journal of Intelligent & Fuzzy Systems 32, no. 5 (April 24, 2017): 3585–94. http://dx.doi.org/10.3233/jifs-169294.
Full textLuo, Jian-Zhen, Shun-Zheng Yu, and Jun Cai. "Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/962974.
Full textHuang, Yuyao, Hui Shu, Fei Kang, and Yan Guang. "Protocol Reverse-Engineering Methods and Tools: A Survey." Computer Communications 182 (January 2022): 238–54. http://dx.doi.org/10.1016/j.comcom.2021.11.009.
Full textNarayan, John, Sandeep K. Shukla, and T. Charles Clancy. "A Survey of Automatic Protocol Reverse Engineering Tools." ACM Computing Surveys 48, no. 3 (February 8, 2016): 1–26. http://dx.doi.org/10.1145/2840724.
Full textJi, Yukai, Tao Huang, Chunlai Ma, Chao Hu, Zhanfeng Wang, and Anmin Fu. "IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering." Security and Communication Networks 2022 (November 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/8026280.
Full textCai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.
Full textZhao, Li Hua, Xue Jia Liang, Xiang Peng, Hua Feng Kong, and Mei Zhen Wang. "An Automatic Network Protocol State Machine Inference Method in Protocol Reverse Engineering." Applied Mechanics and Materials 513-517 (February 2014): 2496–501. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2496.
Full textLuo, Xin, Dan Chen, Yongjun Wang, and Peidai Xie. "A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering." Sensors 19, no. 3 (February 10, 2019): 716. http://dx.doi.org/10.3390/s19030716.
Full textLuo, Jian-Zhen, Chun Shan, Jun Cai, and Yan Liu. "IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering." Symmetry 10, no. 11 (November 1, 2018): 561. http://dx.doi.org/10.3390/sym10110561.
Full textWANG, Ying, Li-ze GU, Zhong-xian LI, and Yi-xian YANG. "Protocol reverse engineering through dynamic and static binary analysis." Journal of China Universities of Posts and Telecommunications 20 (December 2013): 75–79. http://dx.doi.org/10.1016/s1005-8885(13)60217-4.
Full textStute, Milan, David Kreitschmann, and Matthias Hollick. "Reverse Engineering and Evaluating the Apple Wireless Direct Link Protocol." GetMobile: Mobile Computing and Communications 23, no. 1 (July 24, 2019): 30–33. http://dx.doi.org/10.1145/3351422.3351432.
Full textDuchêne, Julien, Colas Le Guernic, Eric Alata, Vincent Nicomette, and Mohamed Kaâniche. "State of the art of network protocol reverse engineering tools." Journal of Computer Virology and Hacking Techniques 14, no. 1 (January 25, 2017): 53–68. http://dx.doi.org/10.1007/s11416-016-0289-8.
Full textLiu, Hai Yan, Yue Zhao, and Rui Huang. "Study and Design on Vulnerability Discovering of Network Protocols." Applied Mechanics and Materials 556-562 (May 2014): 5526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5526.
Full textWang, Xiaowei, Kezhi Lv, and Bo Li. "IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols." International Journal of Parallel, Emergent and Distributed Systems 35, no. 3 (September 3, 2019): 376–95. http://dx.doi.org/10.1080/17445760.2019.1655740.
Full textJi, Ran, Jian Wang, Chaojing Tang, and Ruilin Li. "Automatic Reverse Engineering of Private Flight Control Protocols of UAVs." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1308045.
Full textTao, Siyu, Hongyi Yu, and Qing Li. "Bit-oriented format extraction approach for automatic binary protocol reverse engineering." IET Communications 10, no. 6 (April 14, 2016): 709–16. http://dx.doi.org/10.1049/iet-com.2015.0797.
Full textCaballero, Juan, and Dawn Song. "Automatic protocol reverse-engineering: Message format extraction and field semantics inference." Computer Networks 57, no. 2 (February 2013): 451–74. http://dx.doi.org/10.1016/j.comnet.2012.08.003.
Full textWang, Sheng, Wen-Shu Ni, Ze-Wen Chen, Bao Feng, Yu Ning, Yi-Hao Kang, and Yan Xia. "Nonadiabatic geometric quantum computation of W-state codes using invariant-based reverse engineering." Laser Physics Letters 20, no. 1 (December 8, 2022): 015203. http://dx.doi.org/10.1088/1612-202x/aca759.
Full textMa, Rongkuan, Hao Zheng, Jingyi Wang, Mufeng Wang, Qiang Wei, and Qingxian Wang. "Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis." Frontiers of Information Technology & Electronic Engineering 23, no. 3 (March 2022): 351–60. http://dx.doi.org/10.1631/fitee.2000709.
Full textWen, Shameng, Qingkun Meng, Chao Feng, and Chaojing Tang. "Protocol vulnerability detection based on network traffic analysis and binary reverse engineering." PLOS ONE 12, no. 10 (October 19, 2017): e0186188. http://dx.doi.org/10.1371/journal.pone.0186188.
Full textDing, Li Li, Zheng Wei Wang, and Xiao Ling Wang. "Auction-Based Resource Allocation in Computational Grids." Advanced Materials Research 816-817 (September 2013): 847–50. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.847.
Full textGao, Yan Lin, Wen Peng Wang, and Chuan Sheng Wu. "Exploring Data Communication at System Level through Reverse Engineering." Applied Mechanics and Materials 687-691 (November 2014): 3809–11. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3809.
Full textHan, Joong Soo, and Eul Gyu Im. "Method of Protocol Reverse Engineering using Application Inference Method based on Symbolic Execution." KIISE Transactions on Computing Practices 25, no. 4 (April 30, 2019): 231–37. http://dx.doi.org/10.5626/ktcp.2019.25.4.231.
Full textLee, Min-Seob, Kyu-Seok Shim, Young-Hoon Goo, Ui-Jun Baek, Byeong-Min Chae, Ho-Won Moon, and Myung-Sup Kim. "Identification of Delimiter and Static Field in Protocol Reverse Engineering Using Statistic Analysis." Journal of Korean Institute of Communications and Information Sciences 44, no. 5 (May 31, 2019): 904–13. http://dx.doi.org/10.7840/kics.2019.44.5.904.
Full textKleber, Stephan, Lisa Maile, and Frank Kargl. "Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis." IEEE Communications Surveys & Tutorials 21, no. 1 (2019): 526–61. http://dx.doi.org/10.1109/comst.2018.2867544.
Full textAbeyesinghe, Anura, Igor Devetak, Patrick Hayden, and Andreas Winter. "The mother of all protocols: restructuring quantum information’s family tree." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 465, no. 2108 (June 5, 2009): 2537–63. http://dx.doi.org/10.1098/rspa.2009.0202.
Full textSummers, Joshua D., Claudia Eckert, and Ashok K. Goel. "Function in engineering: Benchmarking representations and models." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 31, no. 4 (September 14, 2017): 401–12. http://dx.doi.org/10.1017/s0890060417000476.
Full textJärpe, Eric. "An Alternative Diffie-Hellman Protocol." Cryptography 4, no. 1 (February 25, 2020): 5. http://dx.doi.org/10.3390/cryptography4010005.
Full textLin, Ying-Dar, Yu-Kuen Lai, Quan Tien Bui, and Yuan-Cheng Lai. "ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines." Journal of Network and Computer Applications 171 (December 2020): 102819. http://dx.doi.org/10.1016/j.jnca.2020.102819.
Full textMomenian, Nayere, and Behrouz Tork Ladani. "Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages." Signal and Data Processing 16, no. 2 (September 1, 2019): 19–40. http://dx.doi.org/10.29252/jsdp.16.2.19.
Full textKang, Wang Lin, Xin Min Liu, and Kai Wang. "A Multi-Agent Management System for Grid Resource Allocation." Advanced Materials Research 760-762 (September 2013): 973–76. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.973.
Full textLuo, Jia-Ning, and Ming-Hour Yang. "EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication." Sensors 19, no. 21 (October 23, 2019): 4611. http://dx.doi.org/10.3390/s19214611.
Full textAryanfar, Asghar, Yara Ghamlouche, and William A. Goddard III. "Pulse Reverse Protocol for efficient suppression of dendritic micro-structures in rechargeable batteries." Electrochimica Acta 367 (January 2021): 137469. http://dx.doi.org/10.1016/j.electacta.2020.137469.
Full textDing, Li Li, Xiao Ling Wang, and Zheng Wei Wang. "A Grid Flow Management System for Resource Allocation Problem." Advanced Materials Research 706-708 (June 2013): 1985–88. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.1985.
Full textHan, Shi-Yuan, and Chang-Yue Zhang. "ASMAC: An Adaptive Slot Access MAC Protocol in Distributed VANET." Electronics 11, no. 7 (April 5, 2022): 1145. http://dx.doi.org/10.3390/electronics11071145.
Full textMarino, Bruno D. V., Vinh Truong, J. William Munger, and Richard Gyimah. "Direct measurement forest carbon protocol: a commercial system-of-systems to incentivize forest restoration and management." PeerJ 8 (April 27, 2020): e8891. http://dx.doi.org/10.7717/peerj.8891.
Full textHang, R., W. A. Krzymien, and C. L. Despins. "Improved MAC protocol for reverse link packet data transmission in wideband DS-CDMA." IEEE Transactions on Wireless Communications 2, no. 1 (January 2003): 162–74. http://dx.doi.org/10.1109/twc.2002.806388.
Full textAdhi, B. Anantasatya, Ruki Harwahyu, Abdusy Syarif, Harris Simaremare, R. Fitri Sari, and Pascal Lorenz. "AODV-UI Proof of Concept on MIPS-based Wireless Router." Journal of Communications Software and Systems 10, no. 1 (March 21, 2014): 14. http://dx.doi.org/10.24138/jcomss.v10i1.136.
Full textAslam, Kousar, Loek Cleophas, Ramon Schiffelers, and Mark van den Brand. "Interface protocol inference to aid understanding legacy software components." Software and Systems Modeling 19, no. 6 (June 28, 2020): 1519–40. http://dx.doi.org/10.1007/s10270-020-00809-2.
Full textLong, Hao, Shukui Zhang, Yang Zhang, Li Zhang, and Jin Wang. "A Privacy-Preserving Method Based on Server-Aided Reverse Oblivious Transfer Protocol in MCS." IEEE Access 7 (2019): 164667–81. http://dx.doi.org/10.1109/access.2019.2953221.
Full textEnamul Quadir, Md Shahed, and John A. Chandy. "Key Generation for Hardware Obfuscation Using Strong PUFs." Cryptography 3, no. 3 (July 17, 2019): 17. http://dx.doi.org/10.3390/cryptography3030017.
Full textSun, Haitao, Chengjie Jin, Xiaohan Helu, Hui Lu, Man Zhang, and Zhihong Tian. "Research on android infiltration technology based on the silent installation of an accessibility service." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090362. http://dx.doi.org/10.1177/1550147720903628.
Full textLi, Fulin. "Application of Artificial Intelligence Technology in Computer Network Security Communication." Journal of Control Science and Engineering 2022 (July 21, 2022): 1–6. http://dx.doi.org/10.1155/2022/9785880.
Full textCui, Xinyu, and Guifen Chen. "Research on Distributed In-Vehicle Wireless Self-Organized Routing Protocol Distribution Mechanism." Journal of Sensors 2021 (October 13, 2021): 1–10. http://dx.doi.org/10.1155/2021/8343536.
Full textCui, Xinyu, and Guifen Chen. "Research on Distributed In-Vehicle Wireless Self-Organized Routing Protocol Distribution Mechanism." Journal of Sensors 2021 (October 13, 2021): 1–10. http://dx.doi.org/10.1155/2021/8343536.
Full textNGAN, A. H. W., and K. W. SIU. "Are super-long escalators safe? Lessons learned from the Langham Place escalator incident in Hong Kong." HKIE Transactions 28, no. 1 (April 15, 2021): 49–57. http://dx.doi.org/10.33430/v28n1thie-2019-0029.
Full text